Bringing Mobility-Awareness to WLANs using PHY Layer Information

Size: px
Start display at page:

Download "Bringing Mobility-Awareness to WLANs using PHY Layer Information"

Transcription

1 Bringing Mobility-Awareness to WLANs using PHY Layer Information Li Sun University at Buffalo, SUNY Souvik Sen HP Labs Dimitrios Koutsonikolas University at Buffalo, SUNY ABSTRACT With the proliferation of smartphones and tablets, mobile devices are soon becoming a preferred medium of Internet access in Wireless LANs (WLANs). Due to their smaller form factor, these truly mobile devices allow the users to access the wireless networks while undergoing different types of mobility, posing new challenges to wireless protocols. Current history-based protocols that maximize performance in static settings do not work well in mobile settings where wireless conditions change rapidly. Thus, today s WLANs need to be able to determine the type of the client s mobility and employ appropriate strategies in order to sustain high performance. While previous work tried to detect mobility using hints from sensors available in today s mobile devices, in this work, we demonstrate how different mobility modes can be distinguished by using physical layer information Channel State Information (CSI) and Time-of-Flight (ToF) available at commodity APs, with no modifications on the client side. In addition, we demonstrate how fine-grained mobility determination can be exploited to improve performance of client roaming, rate control, frame aggregation, and MIMO beamforming. Our testbed experiments show that our mobility classification algorithm achieves more than 92% accuracy in a variety of scenarios, and the combined throughput gain of all four mobility-aware protocols over their mobility-oblivious counterparts can be more than %. Categories and Subject Descriptors C.2. [Network Architecture and Design]: Wireless communication Keywords WLAN; Mobility; Channel State Information; Time-of-Flight; Client Roaming; Rate Adaptation; Frame Aggregation; Beamforming Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org. CoNEXT 4, December 2 5, 24, Sydney, Australia. Copyright 24 ACM /4/2... $5.. INTRODUCTION Wireless LANs (WLANs) were previously dominated by static network users with devices such as laptops and notebooks. However, with the proliferation of smartphones, tablets, and the advent of the BYOD phenomenon, mobile devices are soon becoming the preferred medium of Internet access. Due to their smaller form factor, these truly mobile devices allow the users to access the wireless network while undergoing different forms of mobility. Thus, unlike previously when WLANs used to mainly serve static clients, today they need to be optimized for mobile clients as well. Client mobility poses difficult problems to the WLAN protocols. In static scenarios, the wireless channel remains stable and hence wireless protocols can refer to the past transmission history, carefully adapting themselves to avoid any failures and optimize performance. In contrast, during mobility, wireless conditions may change frequently requiring protocols to be agile and apply different strategies. Designing such strategies is not trivial because they depend on the actual type of mobility demonstrated by the client. E.g., the length of past history that a wireless protocol can refer to depends on the intensity of the mobility of the client. If the client is walking towards her access point (AP), the wireless channel is likely to become better and hence transmission bit-rate control can be more aggressive. Whereas if the client is walking away from her AP, bit-rate control needs to be conservative. The WLAN should try to move the client to a better AP only when the client is moving away from her AP and should not consider roaming for static clients because it is unlikely that a better AP will be discovered. Likewise, mechanisms to obtain higher throughput in modern 82.n/ac WLANs, such as frame aggregation, beamforming, multiuser-mimo (MU- MIMO), require different optimizations based on the intensity of mobility of the client. Therefore, unless the WLAN protocols can somehow determine the type of the client s mobility and thereafter employ appropriate strategies, it is unlikely that they will be able to sustain high performance. Today s WLAN protocols are unable to distinguish between different types of client mobility that a wireless client may undergo. They generally try to sustain performance by applying heuristics to reduce wireless errors. If the number of errors is high, current protocols try to improve performance by employing aggressive strategies. On the other hand, if the number of errors is low, they try to maintain reliability by being more conservative. Such a general framework is slow to adapt to client mobility. 53

2 Recognizing the difficulty to detect mobility using the client s RSSI values, recent work [] tried to detect mobility using the accelerometer in a mobile phone. While this technique can broadly classify between stationary and mobile devices, it has a few disadvantages. First, the use of client s on-board sensor means that mobility detection can only be performed by the mobile client. This requires changes at both the client and the AP because, to benefit download traffic, the protocol is required to communicate the device s mobility state to the AP. Second, this technique can be implemented only on client devices that have an accelerometer, and it requires the sensor to be on consuming battery life. Rather than changing the client, which is a more difficult proposition, we demonstrate how different mobility modes can be distinguished by using physical (PHY) layer information available at commodity APs. In our study we identify four broad categories of client mobility. If the client is stationary, it can be in the static mobility mode when there are no significant environmental changes affecting the channel between the AP and the client. A static client may also be in the environmental mobility mode when the channel changes due to external movements. Of course the wireless client itself may be moving a mobility mode that we call device mobility. The wireless client may experience different speeds under device mobility. However, we identify two broad and dominant categories of device mobility in WLANs. First, the user may slowly move the device although she is stationary or her movement is confined within a small area. E.g., the user may be attending a VoIP call over WiFi and a little movement of her head may displace her smartphone. The user may be playing an online multi-user game where the game controls require her to shake the phone or tablet frequently. She may be roaming around within her office or cubicle while watching a streaming video or listening to streaming music. We define that the client is under micromobility if it is under device-mobility but its location is confined within a small area. On the other hand, device mobility may also cause the client to change its location as its user walks from one location to another. In such scenarios, we classify the client to be under macro-mobility. We utilize Channel State Information (CSI) and Time-of-Flight (ToF) values available from off-the-shelf HP MSM APs to determine the client s mobility mode. CSI captures the finegrained characteristics of the wireless channel. We show that the temporal changes in the CSI can discriminate between static, environmental, and device mobility. However the CSI value may change similarly for micro and macro mobility scenarios. To distinguish between these two device mobility modes, we find that the client s distance from the AP changes significantly under macro-mobility, whereas under micro-mobility her distance seldom changes. The ToF can reliably indicate the distance between the client and the AP because it captures the round trip propagation time between the two. The increasing vs. decreasing trend of the client s distance can further indicate her relative heading with respect to the AP, whether the client is moving away from or moving towards the AP. In addition to mobility determination using PHY layer information, we make the following contributions: Client roaming: In section 3, we demonstrate how the knowledge of the mobile client s relative heading can be exploited to improve client roaming in WLANs. By encour Static Environmental.2 Micro Macro Standard deviation of RSSI Figure : of standard deviation of RSSI computed every 5 seconds, for various types of mobility. aging the client to roam when it is moving away from its current AP, our protocol improves performance by up to 4% in our testbed experiments. Rate control: In section 4, we show how mobility-awareness can further improve an existing frame-based rate control scheme. Mobility hints can help the rate control scheme determine when it can aggressively increase rate or whether past history should be accounted for while choosing the bitrate. Testbed experiments show that mobility-aware rate control can improve performance by up to 3%. Frame Aggregation: In section 5, we demonstrate that the frame aggregation size needs to be adapted depending on the client s mobility mode. Our testbed experimentation shows that, when compared with schemes using default aggregation size, our adaptive scheme can improve throughput by up to 3%. Beamforming and MU-MIMO: Beamforming and MU-MIMO require frequent and expensive CSI feedback from the client. In section 6, we show that the frequency of CSI feedback depends on the mobility mode of the client. By adapting the CSI feedback frequency based on client s mobility, we demonstrate that performance can be improved by up to 7% in testbed experiments. 2. MOBILITY CLASSIFICATION This section presents our design and algorithms for mobility classification using PHY layer information. We begin with a description of our experimental setting using commodity APs and smartphones. 2. Experimental Setup We use HP MSM 46 APs with Atheros AR939 chipset and Samsung Galaxy S5 smartphones in our experiments. We tuned the AP at 5.85GHz using a 4MHz channel width and the 82.n protocol. The MSM AP is equipped with 3 transmit antennas while the Samsung smartphone has 2 antennas. We sent regular data packets from the AP and collected CSI, ToF, and Received Signal Strength Indicator (RSSI) information from the acknowledgment (ACK) sent by the client. We ran four different experiments to analyze different classes of mobility. First, we evaluated static mobility by placing the smartphone in our lab with several people present but not moving. Second, for environmental mobility, we experimented in a cafeteria during lunch hours where the smartphone was static on a table. Third, for micro-mobility, we picked up the phone and moved it around within a meter 54

3 CSI similarity Static Environmental (Strong).2 Environmental (Weak) Micro Macro 2 3 CSI sampling period (ms) Static Environmental (Weak) Environmental (Strong) Micro Macro CSI similarity Micro, sampling period 5ms Macro, sampling period 5ms Micro, sampling period ms.2 Macro, sampling period ms Micro, sampling period 25ms Macro, sampling period 25ms CSI similarity Figure 2: (a) Variation of CSI similarity values over time. of CSI similarity values (b) for various mobility modes, (c) for device mobility at different CSI sampling frequencies. of its location, using natural gestures. Lastly, for evaluating client macro-mobility, we walked naturally with the phone in our hand or inside the pocket. Our goal is to develop simple classification schemes that can distinguish among the above four scenarios. 2.2 Classifying Mobility using RSSI We explore the possibility of classifying the mobility mode of the client solely by relying on the PHY layer information available from commodity WiFi APs. One possibility can be to utilize the RSSI of the client. In our experiments, we found that RSSI is quite stable in static scenarios in a quiet environment (Figure ). However, RSSI is susceptible to any changes in the environment []. Often, the RSSI variation under environmental mobility is higher than the observed variation under device mobility (Figure ). Therefore, we conclude that it is difficult to distinguish between environmental and device mobility solely based on RSSI. We will show next how CSI can conclusively classify these two types of mobility. 2.3 Classifying Mobility using CSI Wireless is a broadcast medium. Any transmitted signal from the client undergoes reflections and arrives along multiple paths (multipath) at the AP. The wireless channel between the client and the AP is expected to vary under environmental or device mobility. This is because the fine-grained multipath structure may change if there are moving objects in the environment, or the device itself moves. These fine-grained variations of the wireless channel cannot be captured by RSSI because it only captures an aggregate indicator of all the multipath components. However, we found that the same variations can be reliably detected by CSI. CSI captures the finegrained multipath characteristics between the client and the AP in the frequency domain. The Atheros 939 chipset can export the CSI of a received packet. On a 2 MHz channel, CSI is reported as a matrix of complex numbers representing the channel gain for each of the 52 subcarriers and every transmit-receive antenna pair at the AP and the client. We track the change in the CSI values to detect any variations of the wireless channel. We define the similarity between CSI samples, csi t and csi t+τ collected at two different time instances t and t + τ as: S(csi t,csi t+τ ) = 52 i= 52 ( )( ) csit i csi t csit+τ i csi t+τ i= ( csit i csi t ) 2 52 i= ( ) 2 csit+τ i csi t+τ () where τ is the time period between the two CSI samples, and csit i, csi t+τ i represent the channel gain for the i-th subcarrier at times t and t + τ, respectively. In static scenarios, for small values of τ, the similarity stays close to because the CSI matches across time indicating a stable channel (Figure 2(a)). In contrast, the similarity value drops sharply under environmental or device mobility due to rapid changes in the wireless channel (Figure 2(a)). Furthermore, we found that the similarity drops faster for device mobility than environmental mobility. This happens because environmental mobility typically affects only a few multipath components, whereas if the client itself is moving, all the multipath components will be affected. Therefore, the wireless channel experiences faster variation under device mobility than under environmental mobility as evident by the larger change in CSI values. Figure 2(b) shows the distribution of similarity of consecutive CSI samples collected at every.5 seconds. Clearly, the similarity distribution can be used to distinguish between static, environmental, and device-mobility scenarios. If the similarity of consecutive CSI samples is greater than T hr st a =.98, we declare that the client is stationary with no environmental changes, whereas a similarity below T hr env =.7 indicates device-mobility. However, from Figure 2(b), it appears that it is difficult to distinguish between device micromobility and macro-mobility using CSI. Figure 2(c) demonstrates that the gap between the micro and macro-mobility distribution increases if we sample the CSI more frequently. However, there are still large overlapping regions. We found that even if we sample the CSI every 5ms, the probability of mis-classification between micro- and macro-mobility is higher than 5%. Therefore, we conclude that even if it is possible to use CSI to distinguish between device and environmental mobility, it cannot be reliably used to distinguish between different classes of device mobility. 2.4 Classifying Device Mobility using Time-of-Flight To classify device mobility, we utilize the intuition that the distance between the client and the AP under macro-mobility changes more than that under micro-mobility. Client s distance can be estimated based on its RSSI [2] or CSI [3] measurements at the AP. However, previous work has shown that RSSI and CSI are unreliable indicators of distance [4]. In search of a better metric for distance, we find that a PHY layer metric called Time-of-Flight (ToF) can accurately capture the distance between the client and the AP [4, 5]. Due to space limitation, we provide here only a high-level overview of the 55

4 AP ToD Idle time ToA Receive ACK Data ToF ACK Calculate CSI similarity S i Client Data SIFS Time ACK Figure 3: Computation of ToD and ToA in the PHY layer using data-ack exchange. Normalized ToF (clock cycles) Micro mobility Macro mobility Time (s) Figure 4: ToF values over time under device mobility. For the macro-mobility scenario the user walks towards and away from the AP periodically. ToF estimation and refer the reader to [4] for details. ToF is defined as the round trip propagation time of a signal transmitted between the AP and the mobile device. The Atheros chipset can precisely compute the Time-of-Departure (ToD) of a data packet when it is sent out in the air at the PHY layer (Figure 3). On correct reception of the packet, the client waits for an SIFS duration (a fixed value in the 82. standard) and starts responding with an ACK packet. The chipset also reports an estimated Time-of-Arrival (ToA) of the ACK packet at the AP as shown in Figure 3. The difference between the ToA and ToD contains the ToF between the AP and the client. Since ToF is proportional to the distance between the client and the AP, it can be used to classify device-mobility. Figure 4 plots the ToF values over time for two different device mobility scenarios. For the micro-mobility scenario, when the user naturally moves the device only within a small area, noisy ToF values can sometimes wrongly indicate changes in distance values. However, the change in noisy ToF values in the micro-mobility case is quite random, while for the macro-mobility scenario the ToF either steadily increases or decreases. This happens due to the fact that during macromobility a user typically walks a reasonable distance between two physical turns. Within a reasonable time interval a walking user may either approach or move away from the AP, without changing her orientation. Therefore, to detect macromobility, we maintain a moving window of ToF values. Only if all the ToF values in the moving window suggest an increasing or decreasing trend, we declare that the client is under macro-mobility, otherwise the client is under micro-mobility. The trend of the ToF values can also suggest the general di- Stop ToF measurement Start ToF measurement Micro mobility Yes No No S i > Thr sta? No S i > Thr env? No ToF measurement start? Yes Calculate ToF trend ToF decreasing? No ToF increasing? Yes Yes Yes Yes Figure 5: Mobility classification design Static Environment mobility Macro mobility: Moving towards AP Moving away from AP Ground truth Detection result (%) Static Environmental Micro Macro Static Environmental Micro-mobility Macro-mobility Table : Evaluation of mobility classification. rection of the client s motion an increasing trend means that the client is moving away from the AP and vice versa. Later, we will demonstrate how the WLAN can optimize client roaming by exploiting the user s direction of motion. 2.5 Evaluation of Mobility Classification Figure 5 shows the overall design of mobility classification using CSI and ToF. We sample the CSI of the client periodically from existing data packet transmissions and maintain a moving average of the similarity between consecutive CSI values. We compare the CSI similarity values with empirically chosen thresholds (see Section 2.3) to distinguish between static, environmental and device mobility. If the CSI similarity indicates device mobility, we need to further consult the client s ToF values. To deal with measurement noise [4], we sample the client s ToF readings every 2ms and aggregate them every second using a median filter. In our implementation, if all ToF values within the past few seconds show an increasing or decreasing trend, we conclude that the client is under macro-mobility. Further, if all the ToF values show an increasing trend, we conclude that the client is moving away from the AP and vice versa. We implemented our mobility classification algorithm using the HP MSM APs and evaluated its accuracy by performing experiments at more than locations (different from those we used for learning the various thresholds and parameters of our scheme in Sections 2.3, 2.4) in two office buildings for over 24 hours. At each location we subject the client to different forms of mobility. Table presents our overall performance results. We observe that the accuracy of our mobility 56

5 Percentage Percentage Accuracy False positives Sampling period (ms) Accuracy False positives Window size Figure 6: Accuracy and false positives of (a) CSI-based mobility detection for various CSI sampling intervals, (b) micro- and macro-mobility detection for various ToF detection window sizes. classification is more than 92% in all scenarios. We also found that the performance of distinguishing stationary vs. device mobility using CSI depends on the sampling period of the CSI (Figure 6(a)). The accuracy is low for short sampling period because the channel may not change very quickly even under device-mobility. We use a CSI sampling period of 5ms in the rest of our evaluation, yielding a median accuracy of 96%. If the client is under device-mobility, we need to consider the ToF values within a detection window of a few seconds and determine if the ToF values have an increasing or decreasing trend. Of course, the larger the detection window, the greater will be the accuracy (Figure 6(b)), but large detection windows will delay the macro-mobility detection. Nonetheless, we find that a detection window of 4s yields a satisfactory accuracy of 98%, and hence we use the same in the rest of the paper. In this work, we identify four broad categories of client mobility. One could suggest more fine-grained mobility classifications, e.g., distinguishing among different subcategories of macro-mobility based on the client s speed or among different types of micro-mobility based on whether the user is static or moves within a small area. However, we argue that in a WLAN environment categorizing client mobility in four broad categories is quite sufficient and yields simplicity in protocol design. In the following sections, we demonstrate that our broad mobility classification already offers substantial performance improvements to a number of wireless protocols. 3. MOBILITY-AWARE CLIENT ROAMING Most wireless clients associate with the AP with the strongest RSSI value. When the RSSI falls below a predefined threshold, the client triggers a handoff, where it scans all the channels and associates with the AP with the strongest RSSI. The problem is that the client-based association control is agnostic of the user s mobility. A moving client may be close to a stronger AP, but it does not try to discover or associate with it, as long as the signal strength of the current AP is above a predefined threshold [6, 7]. Of course, if the client somehow knows that it is moving, it can scan aggressively to search for better APs []. But frequent scanning is time consuming and wastes energy (impacting battery life), consumes RF resources, and prevents the client from transmitting or receiving data (impacting throughput). Therefore, under mobility the client often remains wrongly connected to a far away AP, adversely affecting its own as well as the overall network performance. To address this issue, rather than designing a mobility-aware association scheme that requires changes at the client [], we propose a controller-based protocol that moves the client to the appropriate AP whenever necessary. 3. Controller-based Roaming Protocol Our roaming protocol is based on two main intuitions. First, when the client is stationary or under micro-mobility, it is less likely that a new, better AP will be discovered. Second, when the client is under macro-mobility, roaming is required only when the client moves away from the current AP. We validate these intuitions by performing more than experiments at 5 different locations in our testbed. In each experiment, we subjected the client to different types of mobility and collected the RSSI values of different APs. We used the RSSI values to compute an expected throughput from different APs [8]. Figure 7(a) shows that in most mobility modes, roaming to another AP only marginally improves the performance of the client. Unless the client is walking away from the current AP, it need not roam to improve performance and can continue with the current AP. Environmental mobility can cause fluctuations of the channel between the client and the AP. However, these fluctuations are short term such that the AP with the strongest RSSI is likely to remain optimal over longer time-scales. Under micro-mobility, the client s overall physical location does not change significantly. WLAN deployments are typically well planned where each physical location is meant to be covered by a single strong AP. Therefore, roaming may be necessary only when the client s location changes significantly. But, even under macro-mobility, if the client is approaching her current AP, roaming is not necessary because the channel between the current AP and the client will only become better. On the other hand, if the client is moving away from the current AP, it may have a better channel quality to a neighboring AP. In such scenarios, the controller needs to act to move the client to the right AP. Our controller-based protocol does not impose any changes in the client s association mechanism. The client initially connects with the strongest AP and thereafter scans if the current AP becomes weak. The current AP of the client continuously determines her mobility mode and shares it with the controller. If the current AP indicates that the client is moving away from it, the controller may have to explicitly encourage the client to roam to a better AP. To determine a candidate set of better APs, the controller instructs the neighboring APs to periodically transmit NULL data frames and compute the client s distance, RSSI and heading information towards themselves. If the client is moving towards another AP whose signal strength value is similar or higher than the current AP, 57

6 Moving towards Environmental Micro Static Moving away Throughput gain (%) Motion aware client roaming Phone sensor based client roaming Default scheme Throughput (Mbps) Figure 7: (a) Throughput gain by dynamically switching to the strongest AP vs. sticking to the current AP. (b) Comparison of proposed controller-based client roaming using mobility hints against existing protocols. it is likely that the same AP will improve the client s long term performance. Note that there can be several such candidate APs which may be more appropriate (in terms of heading and signal strength) for the client. If the controller finds at least one such better AP, it instructs the current AP to disassociate the client and asks only the APs in the candidate set to respond to the client s probe request. Consequently, the client chooses an AP from the candidate set and roams to a better AP, ultimately improving performance. 3.2 Performance Evaluation We implemented our mobility-aware client roaming protocol in our testbed of 6 HP APs (Figure 3(a)) and used a laptop connected to the APs over Ethernet as the controller. We walked naturally with the phone and injected UDP traffic from the controller to evaluate performance. We compared our scheme with the client s default roaming scheme as well as the client-based association control scheme described in [] in which the client periodically scans for better APs if it is mobile. Figure 7(b) shows that the client s performance can be improved by assisting her to roam to a better AP when it is moving away from her current AP. Of course encouraging the client to roam requires forced disassociation from the current AP that triggers a scanning operation at the client. Scanning adds overhead. We find that the client typically completes association with a stronger AP within 2ms after being disassociated from the current AP. We believe this is reasonable because after association the client will probably use the new AP for a long duration. Nonetheless, even with the scanning overhead, our proposal improves median performance by nearly 3% over the default roaming scheme. 4. MOBILITY-AWARE BIT RATE ADAPTATION Knowledge of client s mobility state can aid bit-rate adaptation because mobility affects wireless channel conditions. The higher the intensity of motion, the faster the channel may change and the quicker the optimal bit rate becomes stale. We investigate how the optimal bit-rate of the client changes under mobility. Figure 8(a) plots the time duration for which a particular bit-rate remains optimal for different mobility modes in our testbed. For this experiment we computed the optimal rate using trace-based emulation, similar to [9]. Clearly, the optimal bit-rate changes faster if the client is mobile than when it is static. It is possible to track the optimal bit-rate in static scenarios by maintaining long success/failure history. However, under mobility, the optimal bit-rate changes quickly and hence the rate control algorithm should rely only on the recent transmission history. We further found that depending on the client s direction of motion, i.e., moving away from or moving towards the AP, the optimal rate typically changes either upwards or downwards (Figure 8(b)). Therefore, the client s direction of motion relative to the AP can be used as a hint by the rate control algorithm. Under environmental or micro-mobility, the rate change does not show any pattern (Figure 8(c)), but the optimal bit-rate stays within a small set of values. This happens because under environmental or micro-mobility, the frequency-selective nature of the channel may change but the overall path-loss between the AP and the client remains similar. These observations suggest that current rate control schemes can improve performance by adapting according to the client s mobility mode. We demonstrate how this may be feasible by incorporating mobility-awareness in the existing Atheros MIMO rate adaptation (RA) scheme. 4. Atheros MIMO Rate Adaptation Atheros MIMO Rate Adaptation (RA) is the default RA in HP MSM 46 APs. It employs a transmitter-side frame-based adaptation approach and does not require any training or client feedback. The objective of the algorithm is to determine the bit-rate that maximizes the MAC layer throughput which is calculated as bit-rate * (-PER) where PER is the packet error rate at the given bit-rate. After each frame transmission, the algorithm updates the PER at the current bit-rate based on the number of packet failures within the aggregated frame. It applies a low pass filter on the instantaneous PER PER new, as calculated from the last transmitted frame, and maintains a weighted moving average of the PER value (PER avg ): PER avg = α PER new + ( α) PER avg (2) where α is called the smoothing factor and has a default value of /8 in the Atheros RA implementation. A larger α gives a smaller weight on the previous PER history. This operation smooths out the transients and takes into account past history. The algorithm further updates the PER of other bit-rates based on the PER of the current rate. This is done by assuming that the PER is a monotonically increasing function of rate. The Atheros RA skips the MCS 5 7 for single stream and MCS 8 for double stream to maintain PER monotonicity. 58

7 Static Environmental mobility.2 Micro mobility Macro mobility Time duration in milliseconds MCS index Moving towards Moving away Time in seconds MCS index Environmental mobility Micro mobility Time in seconds Figure 8: (a) of time durations during which a current bit-rate remained optimal and no rate change was necessary. Optimal rate of a client over time when the client is under (b) macro-mobility, (c) environmental or micro-mobility. The Atheros RA starts with the highest bit-rate and sends an aggregated frame containing several packets. If all the packets in a frame are lost such that it completely fails to get a link layer Block ACK, it often switches to the next lower rate. On the other hand, if the AP receives a Block ACK from the client, it updates the PER values and thereafter decides on a lower rate if the PER at the current rate is too high. The Atheros RA also tries to increase bit-rate whenever possible by sampling higher rates periodically. If the current rate has been successful for more than a predefined probing interval, the algorithm probes the next higher rate. Of course if the wireless channel is deteriorating, excessive probing may hurt performance. We show how Atheros RA can be improved using mobility hints. 4.2 Optimizing Atheros RA using Mobility Hints Based on the observations from our measurements in the previous section (Figure 8), we make the following optimizations to the Atheros rate adaptation algorithm:. The Atheros RA often reduces the bit-rate if it fails to get a link layer Block ACK. This may be appropriate when the client is moving away from the AP because the wireless channel may be deteriorating. However, we note from Figures 8(b), 8(c) that if the client is moving towards the AP or if it is in any other mobility mode, this may be unnecessary because the optimal bit-rate either improves or fluctuates within a small band. In such scenarios, large errors can happen due to transient conditions such as fast fading or interference. We ignore such random effects by retrying at the current rate once or twice (Table 2) before reducing the rate, unless the client is moving away from the AP. 2. In static scenarios, we incorporate longer PER history by choosing a low value of the smoothing factor because bit-rate changes only occasionally if the client is static (Figure 8(a)). However, under mobility, the bit-rate may change quickly and thus the protocol should only account for recent packet successes and failures. Therefore, we choose a smoothing factor that is commensurate to the client s mobility mode. 3. We note that blindly probing higher rates may cause packet losses because the protocol may be already operating at the optimal rate. From Figure 8(b) we note that the optimal bitrate of the client increases rapidly only when it is moving towards the AP. Otherwise, the optimal bit-rate seldom increases or improves only gradually. To avoid packet losses due to probing, we choose the probing interval based on the current mobility mode of the client. If the client is moving towards the AP, we use a short probing interval to quickly increase the rate whenever possible. In contrast, if the client is moving away from the AP, we remain conservative by choosing a long probing interval. 4.3 Rate Adaptation Evaluation We study the benefit of augmenting mobility hints to Atheros RA in our testbed. We modified the rate control implementation in the Atheros driver to control multiple related parameters depending on the mobility mode of the client. We conducted more than experiments on 3 different links with both UDP and TCP traffic. In each experiment, we subjected the client to different types of mobility and tried different values for the Atheros RA parameters. Our final chosen parameters are shown in Table 2. We then evaluated the throughput of download TCP traffic on 5 different links in two different office buildings. At each location we subjected the client to different forms of device mobility. Figure 9(a) shows that by augmenting mobility hints to Atheros RA, it is possible to improve its median performance by 23%. We further compare the performance of our mobility-aware rate adaptation scheme with existing state-of-the art rate control schemes. To ascertain identical channel conditions we performed trace-based emulations using techniques similar to [9]. Specifically, we modified the wireless driver of a HP laptop containing Atheros 939 chipset to extract the CSI information from any download packet from the AP. Thereafter, we walked with the laptop in random directions for 5 minutes each and collected CSI traces for such walking experiments. Using the collected traces we evaluate the throughput of Atheros RA with and without mobility hints, RapidSample [], SoftRate [] and ESNR [9]. Figure 9(b) shows that the mobility-aware Atheros RA performs better than RapidSample which uses sensor hints to optimize rate control. Unlike our scheme, RapidSample is unable to discriminate between fine-grained device mobility modes, e.g. micro vs. macro mobility or moving towards vs. away, and thereafter is unable to apply specific optimizations. Both SoftRate and ESNR use PHY layer information at the client to calculate the bit-rate and report it back to the AP. We find that the mobility-aware Atheros RA achieves almost the same throughput as SoftRate. ESNR outperforms SoftRate because it can indicate the bit-rate of the channel using a single observation, while SoftRate can typically only indicate whether the rate should be increased, decreased, or unchanged []. Our scheme can achieve 9% of ESNR s performance but notably it does not require any modifications at the client or any 59

8 Throughput in Mbps Atheros rate adaptation Motion aware Atheros RA Throughput (Mbps) 5 Atheros RA Motion aware Atheros RA Rapidsample Softrate ESNR Rate control schemes Throughput (Mbps) Aggregation time: 8ms Aggregation time: 4ms Aggregation time: 2ms Static Environmental Micro Macro Aggregation time: 8ms Aggregation time: 4ms Adaptive aggregation Throughput (Mbps) Figure 9: (a) Throughput gain by incorporating mobilityawareness in Atheros rate adaptation. (b) Comparison of mobility-aware Atheros RA against other state-of-the art schemes. per-client calibration to establish the ESNR vs. bit-rate relationship [9]. 5. MOBILITY-AWARE FRAME AGGREGATION To achieve high throughput, IEEE 82. allows the wireless transmitter to aggregate multiple packets in a single frame. Aggregation achieves higher throughput because the PHY protocol overhead over multiple packets can be amortized by packing them into a single frame. As the number of packets in a frame (often referred to as aggregation size) increases, the efficiency of the protocol improves resulting in greater performance. Thus, it is generally believed that choosing a larger aggregation size is beneficial. In fact, current implementations allow the transmitter to aggregate as many packets as it can within an aggregation time of ms [2]. However, choosing the highest aggregation size may hurt performance under mobility as the wireless channel may vary within an aggregated frame. To understand the effect of channel variations on aggregation, we conducted a total of 6 experiments on 2 different links in our office building. We injected download traffic to the client while varying the aggregation size defined in the driver from 2ms to 8ms for each mobility mode. We found that in mobility scenarios, performance can actually decrease if a large aggregation size is used (Figure (a)). This happens because the channel equalization procedure employed by today s wireless radios estimates the channel only at the beginning of the frame. Under mobility, it is quite possible that the wireless channel changes by the end of frame resulting into packet losses. Figure : (a) Mean throughput vs. frame aggregation time in different mobility scenarios. (b) Comparison of the adaptive mobility-aware frame aggregation scheme against schemes that use a statically configured aggregation time. 5. Optimization and Performance Evaluation To optimize the performance of frame aggregation, we note from Figure (a) that the optimal aggregation time varies across different classes of mobility. The higher the intensity of mobility, the lower is the channel coherence time and hence the lower is the optimal aggregation time. Therefore, we propose to tune the aggregation size at the AP based on the mobility state of the client. We modified the WiFi driver at the AP to vary the maximum allowed aggregation time based on the mobility mode of the client 8ms for static and environmental mobility and 2ms for micro- and macro-mobility. The actual aggregation size depends on the bit-rate used to communicate to the client: Aggregation size = Maximum allowed aggregation time / Bit-rate. We evaluated our modifications on 5 different links in two office buildings and subjected the client to various mobility modes, while injecting download TCP traffic from the AP. Figure (b) plots the performance of our aggregation scheme on 5 different links. By selecting the aggregation size based on mobility, it is possible to improve the median throughput performance by 5% over the default Atheros scheme which uses a statically configured 4ms maximum aggregation time. 6. MOBILITY-AWARE BEAMFORMING AND MU-MIMO MIMO beamforming can improve the performance of a wireless link by exploiting multiple antennas at the transmitter. Single-user (SU) beamforming in 82.n precodes a single packet across multiple antennas at the AP so that the signals 6

9 Throughput (Mbps) Feeback period: 2ms Feeback period: 5ms Feeback period: ms Feeback period: 2ms Feeback period: 5ms Feeback period: 2ms Throughput in Mbps 5 5 CSI feedback period: 2ms Feedback period: 5ms Feedback period: ms Feedback period: 5ms Feedback period: 2ms Static Environmental Micro Macro Environmental Micro mobility Macro mobility Default TxBF Motion aware TxBF Throughput (Mbps) Figure : (a) Average throughput vs. CSI feedback period in different mobility scenarios using transmit beamforming. (b) of throughput gain for 3 different links subjected to a variety of mobility modes. from different antennas combine coherently at the client, enhancing performance. Similarly, 82.ac multi-user MIMO (MU-MIMO) precodes packets for different clients so that they can be transmitted simultaneously. The precoding operation combines the outgoing packets and carefully chooses the weights based on the CSI values between the AP (transmitter) and all the clients (receivers). Therefore, for effective beamforming, the AP must obtain timely CSI feedback from all the clients. The CSI feedback packet may consist of a real and imaginary value (quantized into up to 8 bits) for each subcarrier and transmit-receive antenna pair. Frequent CSI feedback may be harmful because the feedback packet is typically transmitted at the lowest bit-rate, consuming significant channel airtime. On the other hand, infrequent feedback may often result in stale CSI and consequently performance loss. Hence managing the CSI feedback period is critical to the performance of MIMO beamforming. 6. Effect of Mobility on SU-Beamforming To understand the effect of CSI feedback period on SU-Beamforming, we conducted 5 experiments on more than 5 different links in our office building by allowing the AP to periodically initiate CSI feedback from the client and employ beamforming while transmitting the data packets. We found that none of the popular smartphones support explicit beamforming and hence we used an AP as the client in our beamforming experiments. Figure (a) shows that in static scenarios, a shorter CSI feedback period can actually hurt performance. This is because the wireless channel remains stable in static scenarios. Therefore, frequent feedback only adds.6.4 Stationary client.2 Micro mobility Macro mobility Overall gain 5 Throughput gain (%) Figure 2: (a) Average throughput vs. CSI feedback period using MU-MIMO techniques to serve three different clients. (b) of throughput gain for 2 emulation scenarios. Each scenario includes 3 clients, one each in environmental, micro-, and macro-mobility mode. to the overhead and does not always result in better CSI estimates. In contrast, if the client is mobile, the wireless channel can change quickly, requiring frequent CSI feedback. Thus, we need to adapt the CSI feedback period depending on the client s mobility mode. 6.2 Effect of Mobility on MU-MIMO Our AP platform only supports 82.a/b/g/n and hence is not amenable to MU-MIMO experiments. We resort to tracebased emulations to understand the effect of feedback period on MU-MIMO. We emulate a scenario where the AP has 3 antennas and employs MU-MIMO techniques to concurrently serve 3 clients one each in environmental, micro- and macromobility scenarios. For the emulation, we simultaneously collected CSI traces at 3 locations using laptops containing Atheros 939 chipset and a single receive antenna. We instrumented the Atheros driver used in the laptop to report the CSI values for every transmitter-receiver antenna pair for each data packet received from the AP. Thereafter we sent data packets from the AP to each laptop every 5us. We fed the series of CSI values to a MU-MIMO emulator written in C. The emulator simulates CBR traffic between the AP and the clients and reports the throughput for each client with and without MU- MIMO techniques. Figure 2(a) shows that MU-MIMO is also sensitive to stale CSI values. Interestingly, mobility only affects the performance of the mobile client and does not impact the static clients noticeably. This happens because MU-MIMO precoding ensures that signals from all the transmit antennas com- 6

10 bine coherently at each intended client, which is only related to the channel between the AP and the respective client. Therefore it is possible to improve MU-MIMO performance by using different CSI feedback periods that are commensurate to the mobility modes of individual clients. 6.3 Performance Optimization & Evaluation To optimize performance using SU-beamforming and MU-MIMO, we note from figures (a) and 2(a) that the optimal CSI feedback period varies across different classes of mobility. The higher the intensity of mobility, the quicker the CSI becomes stale and hence the higher is the required frequency of the CSI feedback. Therefore, we propose to tune the CSI feedback period at the AP based on the mobility state of the client. We modified the WiFi driver at the AP to vary the feedback period based on the mobility mode of the client 2ms for static, 5ms for environmental mobility, ms for micro-, and 5ms for macro-mobility. We evaluated SU-beamforming using adaptive CSI feedback on 3 different mobile links in two office buildings by injecting download TCP traffic from the AP. Figure (b) shows that by selecting the feedback period based on mobility, it is possible to improve the median throughput by 33% over the default Atheros scheme which uses a statically configured 2ms feedback period. To evaluate the benefits of adaptive CSI feedback on MU- MIMO, we used the trace based emulation setup described in section 6.2. In total, we collected CSI traces from 5 uniformly chosen locations from a busy office environment. At each location, we kept the client stationary for approximately 5 minutes, followed by micro-mobility and macro-mobility experiments for the same interval. Apart from collecting the CSI trace at the client, we also recorded the CSI and ToF values from the data-ack exchange at the AP. For each trace, we estimate the mobility mode of the client every second using our techniques described in section 2. Thereafter we randomly pick 3 client locations and feed the corresponding CSI traces and mobility estimates to our MU-MIMO emulator. To calculate the precoding vector, the MU-MIMO emulator samples the CSI traces every feedback period. For our scheme, the feedback period is chosen on a per client basis depending on her mobility state 2ms for static, 5ms for environmental mobility, ms for micro-, and 2ms for macro-mobility, whereas the default scheme uses a 2ms CSI feedback period for all clients. The emulator uses Atheros RA for rate control and does not employ aggregation. We repeated the emulation 2 times, each time with a different set of 3 client locations. Figure 2(b) plots the throughput gain of MU-MIMO using adaptive CSI feedback over the static feedback period scheme. Performance gain is evident for all varieties of mobility, with the most gains for clients under macro-mobility. On average, our scheme improves MU-MIMO s network throughput by close to 4%. 7. OVERALL PROTOCOL PERFORMANCE As explained in the preceding sections, we implement the client s mobility mode detection scheme at the AP. Further, depending on the client s mobility mode, at the AP and the WLAN controller, we implement several actions to improve rate control, client roaming, aggregation and beamforming AP Walking trajectory Motion aware scheme 82.n default scheme Throughput (Mbps) Figure 3: (a) Testbed setting for overall performance evaluation. (b) of end-to-end throughput for 9 tests with and without mobility hints. (Table 2) 2. To evaluate the combined protocol performance for all such optimizations, we conducted iperf-based system throughput tests in our testbed using 6 APs (Figure 3(a)) with UDP traffic. We walked naturally with the client through different parts of the trajectory shown in Figure 3(a) and evaluated the performance of our system as well as the default system which does not distinguish client s mobility. As shown in Figure 3(b), the mobility-aware scheme outperformed the default system in all the 9 tests we conducted in our testbed. By taking appropriate actions based on the client s mobility mode, we improve overall protocol performance by almost %. 8. RELATED WORK Sensor hint-based optimization: The work closest to ours is [], which uses sensor hints (e.g., from GPS, accelerometers, gyroscopes) from mobile devices to augment wireless protocols. For example, the authors use mobility hints from the accelerometer to select between two rate adaptation algorithms; SampleRate [3] (in static environments) or Rapid- Sample (in mobile environments). They further use accelerometer hints to implement a hint-aware roaming protocol. Our results in sections 3 and 4 demonstrate that due to our PHYbased fine-grained discrimination of mobility modes, we outperform both RapidSample and the client-based roaming protocol from []. Further, while [] only considers legacy 82., we show how mobility hints can help high-throughput 2 We could not implement our MU-MIMO optimizations in the testbed because of lack of 82.ac support. 62

11 Mobility type Protocol Parameter Macro mobility Static Environment Micro mobility Moving away Moving towards Client roaming Roaming preparation no no no Encourage client to roam to better AP if available. no Probe interval 5ms 5ms 5ms ms 2ms Rate adaptation PER smoothing factor /6 /2 /4 /3 /3 Rate retries 2 Frame aggregation Aggregation limit 8ms 8ms 2ms 2ms 2ms Beamforming CV update interval 2ms 5ms ms 5ms 5ms MU-MIMO CV update interval 2ms 5ms ms 2ms 2ms Table 2: Summary of mobility-aware protocol actions. mechanisms introduced in the 82.n/ac standards, such as frame aggregation, beamforming and MU-MIMO. Trinity [4] also uses accelerometer-based mobility hints to optimize distributed antenna systems and network-mimo. Mobisteer [5] uses location hints from GPS to find the best directional antenna orientation and the AP to associate with. Breadcrumbs [6] builds a mobility model based on GPS coordinates and uses it to predict the best AP to associate with. CARS [7] uses GPS readings to optimize rate control. In contrast to existing works, we exploit PHY layer information available from off-the-shelf APs to obtain the client s mobility information, without relying on any external sensor and without requiring any coordination with the client. PHY-based mobility detection: Recently, there has been a lot of interest in developing device-free passive motion detection systems using radio signal dynamics. While most proposals require hardware modifications [8 2], [2 24] use RSSI, and FIMD [25] proposes CSI-based techniques. These systems can only identify environmental mobility and often have higher complexity than our system. For example, FIMD uses feature extraction and data fusion from multiple links to detect environmental mobility with 9% accuracy. We can classify among static, environmental, and device mobility by only calculating the similarity of the CSI values from a single link. Rate control and client roaming: A large number of RA algorithms have been proposed in the past. They can be classified into frame-based [3, 26 3], SNR-based [9, 32 34], and PHY-layer based [9 ]. Frame-based algorithms are often used in practice due to their simplicity but they are slow to respond to rapidly changing channel conditions in mobile environments. SNR-based algorithms can adapt faster but they need in-situ training to overcome this sensitivity [35]. PHY-layer based approaches have been shown to outperform SNR-based algorithms but they cannot be implemented on commodity APs. ESNR [9] uses CSI from commodity cards to estimate the bit-rate, but it requires careful per-client calibration to obtain the ESNR vs. bit-rate relationship. Our mobility-aware modifications of the frame-based Atheros RA algorithm does not require any such calibration and achieves 9% of ESNR s performance on average. Like rate control, client roaming has been widely studied to improve wireless performance [36 39]. However, unlike our scheme, most proposals either require changes at the client [37, 38] or at both the AP and the client [39]. Like DenseAP [4], we manage the client s association from the controller with no modifications at the client. We further improve controller-based association control by incorporating mobility hints. 82.n/ac enhancements: Impact of channel dynamics on 82.n frame aggregation have been studied using simulation [4], modeling [42, 43] and testbed experiments [3]. [42] and [43] calculate the frame aggregation limit based on the bit error-rate (BER) and SNR respectively. While BER and SNR can be indirect indicators, we observe that mobilityhints can be a direct indicator of aggregation limit, improving wireless performance. CSI feedback remains a critical issue for high throughput 82.n/ac mechanisms such as beamforming and MU-MIMO [44]. While there has been work towards experimental evaluation of MU-MIMO [45] and its variants [46], decreasing the overhead of CSI feedback is mostly limited to [44]. While [44] is limited to frequent CSI sampling, we show that by augmenting CSI with ToF, mobility hints can reduce the overhead due to the CSI feedback period. 9. DISCUSSION AND LIMITATIONS Uplink traffic: In this work we focused on downlink traffic because download is still the dominant type of traffic in today s WLANs often 2 times more than uplink traffic [47]. While some of our mobility-aware protocol modifications are mostly limited to the AP (e.g., controller-assisted roaming, beamforming, MU-MIMO), the others, such as bit-rate adaptation and frame aggregation can also be implemented on the client side as well to benefit uplink traffic. Roaming for real time traffic: Our roaming protocol explicitly encourages the client to roam whenever it detects that the client is moving towards a better AP. While this approach improves throughput for bulk transfer applications, as we discussed in section 3, the 2 ms required for a handoff may increase both jitter and packet loss for real-time traffic. One solution to this problem will be to minimize the number of handoffs by choosing the farthest, yet reasonably strong, AP the client is moving towards. Alternatively, we note that fast BSS transition in 82.r reduces the handoff overhead to only 4ms [48]; hence, clients such as Apple devices that support 82.r [49] can immediately benefit from our roaming protocol without causing disruptions to real-time traffic. Moving on a circle around the AP: If a client is moving on a circle around the AP, our system will wrongly classify the type of mobility as micro- instead of macro-mobility, as the ToF values will not be characterized by an increasing or decreasing trend. Although this is not a typical mobility pattern, in our future work, we plan to augment our system with Angle of Arrival (AoA) information [3, 5] to address this limitation. Other benefits of mobility-awareness: Mobility-awareness could also guide the selection of channel width (a narrow 2 MHz channel may be more robust than the wider 4MHz, 63

12 8MHz, or 6 MHz channels, and hence, it may be preferred when the client is moving away from the AP) and the type of MIMO mode (spatial diversity may be preferred over spatial multiplexing when the client is moving away from the AP). However, our preliminary experiments did not show any significant gains for these two cases. We plan to investigate these in more detail in our future work. We also plan to study other protocols that could benefit from mobility-awareness, e.g., adapting the length of cyclic prefix based on the client speed, scheduling client traffic at an AP taking movement into account, network monitoring, as well as distributed MIMO techniques.. CONCLUSION Today s WLANs have to be able to distinguish different types of client mobility and use adaptive, motion-aware protocols in order to sustain high performance. In this paper, we demonstrate how different client mobility modes can be distinguished by using physical layer information Channel State Information (CSI) and Time-of-Flight (ToF) available at commodity APs, with no modifications on the client side. Our testbed experiments show that our algorithm achieves more than 9% accuracy in a variety of scenarios. We also demonstrate how fine-grained motion determination can improve performance of client roaming, bit-rate control, frame aggregation, and MIMO beamforming in 82.n/ac WLANs. Our extensive evaluation shows that motion-aware AP-side protocols outperform their motion-oblivious counterparts as well as prior mobility-aware client-side solutions. In particular, the combination of all four mobility-aware protocols improves throughput by almost % over the default AP implementation using motion-oblivious protocols.. ACKNOWLEDGMENTS We thank our shepherd Sam Leffler and the anonymous CoNEXT reviewers for their insightful comments. 2. REFERENCES [] Hari Balakrishnan, Lenin Ravindranath, Calvin Newport, and Samuel Madden. Improving Wireless Network Performance Using Sensor Hints. In Proc. of USENIX NSDI, 2. [2] Krishna Chintalapudi, Anand Padmanabha Iyer, and Venkata N. Padmanabhan. Indoor localization without the pain. In Proc. of ACM MobiCom, 2. [3] Souvik Sen, Jeongkeun Lee, Kyu-Han Kim, and Paul Congdon. Avoiding multipath to revive inbuilding WiFi localization. In Proc. of ACM MobiSys, 23. [4] Alex Mariakakis, Souvik Sen, Jeongkeun Lee, and Kyu-Han Kim. Single access point based indoor localization. In Proc. of ACM MobiSys, 24. [5] Domenico Giustiniano and Stefan Mangold. Caesar: carrier sense-based ranging in off-the-shelf 82. wireless LAN. In Proc. of ACM CoNEXT, 2. [6] Ishwar Ramani and Stefan Savage. Syncscan: practical fast handoff for 82. infrastructure networks. In Proc. of IEEE INFOCOM, 25. [7] Minho Shin, Arunesh Mishra, and William A. Arbaugh. Improving the latency of 82. hand-offs using neighbor graphs. In Proc. of ACM MobiSys, 24. [8] Souvik Sen, Bozidar Radunovic, Jeongkeun Lee, and Kyu-Han Kim. Cspy: finding the best quality channel without probing. In Proc. of ACM MobiCom, 23. [9] Daniel Halperin, Wenjun Hu, Anmol Sheth, and David Wetherall. Predictable 82. packet delivery from wireless channel measurements. In Proc. of ACM SIGCOMM, 2. [] Mythili Vutukuru, Hari Balakrishnan, and Kyle Jamieson. Cross-Layer Wireless Bit Rate Adaptation. In Proc. of ACM SIGCOMM, 29. [] Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury, and Srihari Nelakuditi. AccuRate: Constellation Based Rate Estimation in Wireless Networks. In Proc. of USENIX NSDI, 2. [2] Yang Xiao. IEEE 82.n: enhancements for higher throughput in wireless LANs. IEEE Wireless Communications, 2(6):82 9, 25. [3] John C. Bicket. Bit-rate selection in wireless networks. Master s thesis, Massachusetts Institute of Technology, February 25. [4] Shailendra Singh, Karthikeyan Sundaresan, Amir Khojastepour, Sampath Rangarajan, and Srikanth V. Krishnamurthy. One strategy does not serve all: tailoring wireless transmission strategies to user profiles. In Proc. of ACM HotNets, 22. [5] Vishnu Navda, Anand Prabhu Subramanian, Kannan Dhanasekaran, Andreas Timm-Giel, and Samir R. Das. MobiSteer: Using Steerable Beam Directional Antenna for Vehicular Network Access. In Proc. of ACM MobiSys, 27. [6] Anthony J. Nicholson and Brian D. Noble. BreadCrumbs: Forecasting Mobile Connectivity. In Proc. of ACM MobiCom, 28. [7] Pravin Shankar, Tamer Nadeem, Justinian Rosca, and Liviu Iftode. CARS: Context-Aware Rate Selection for Vehicular Networks. In Proc. of IEEE ICNP, 28. [8] Qifan Pu, Sidhant Gupta, Shyamnath Gollakota, and Shwetak Patel. Whole-home gesture recognition using wireless signals. In Proc. of ACM MobiCom, 23. [9] Bryce Kellogg, Vamsi Talla, and Shyamnath Gollakota. Bringing gesture recognition to all devices. In Proc. of USENIX NSDI, 24. [2] Fadel Adib and Dina Katabi. See through walls with WiFi!. In Proc. of ACM SIGCOMM, 23. [2] Michael Wallbaum and Stefan Diepolder. A Motion Detection Scheme For Wireless LAN Stations. In Proc. of IEEE ICMU, 26. [22] Moustafa Youssef, Matthew Mah, and Ashok Agrawala. Challenges: Device-free Passive Localization for Wireless Environments. In Proc. of ACM MobiCom, 27. [23] Jie Yang, Yong Ge, Hui Xiong, Yingying Chen, and Hongbo Liu. Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments. In Proc. of IEEE INFOCOM, 2. [24] Ahmed E. Kosba, Ahmed Saeed, and Moustafa Youssef. RASID: A Robust WLAN Device-free Passive Motion Detection System. In Proc. of IEEE PerCom, 22. [25] Jiang Xiao, Kaishun Wu, Youwen Yi, Lu Wang, and Lionel M. Ni. FIMD: Fine-grained Device-free Motion Detection. In Proc. of IEEE ICPADS,

13 [26] Ad Kamerman and Leo Monteban. WaveLAN-II: A High-Performance Wireless LAN for the Unlicensed Band. Bell Labs Technical Journal, 2(3):8 33, 997. [27] Gavin Holland, Nitin Vaidya, and Paramvir Bahl. A Rate-Adaptive MAC Protocol for Multi-Hop Wireless Networks. In Proc. of ACM MobiCom, 2. [28] Jongseok Kim, Seongkwan Kim, Sunghyun Choi, and Daji Qiao. CARA: Collision-Aware Rate Adaptation for IEEE 82. WLANs. In Proc. of IEEE INFOCOM, 26. [29] Starky H.W. Wong, Hao Yang, Songwu Lu, and Vaduvur Barghavan. Robust rate adaptation for 82. wireless networks. In Proc. of ACM MobiCom, 26. [3] Ioannis Pefkianakis, Yun Hu, Starsky H.Y. Wong, Hao Yang, and Songwu Lu. MIMO Rate Adaptation in 82.n Wireless Networks. In Proc. of ACM MobiCom, 2. [3] Duy Nguyen and J.J. Garcia-Luna-Aceves. A practical approach to rate adaptation for multi-antenna systems. In Proc. of IEEE ICNP, 2. [32] Jiansong Zhang, Kun Tan, Jun Zhao, Haitao Wu, and Yongguang Zhang. A Practical SNR-Guided Rate Adaptation. In Proc. of IEEE INFOCOM, 28. [33] Glenn Judd, Xiaohui Wang, and Peter Steenkiste. Efficient Channel-aware Rate Adaptation in Dynamic Environments. In Proc. of ACM MobiSys, 28. [34] Lara Deek, Eduard Garcia-Villegas, Elizabeth Belding, Sung-Ju Lee, and Kevin Almeroth. Joint Rate and Channel Width Adaptation for 82. MIMO Wireless Networks. In Proc. of IEEE SECON, 23. [35] Joseph Camp and Edward Knightly. Modulation Rate Adaptation in Urban and Vehicular Environments: Cross-layer Implementation and Experimental Evaluation. In Proc. of ACM MobiCom, 28. [36] Minkyong Kim, Zhen Liu, Srinivasan Parthasarathy, Dimitrios Pendarakis, and Hao Yang. Association control in mobile wireless networks. In Proc. of IEEE INFOCOM, 28 [37] Sudarshan Vasudevan, Konstantina Papagiannaki, Christophe Diot, Jim Kurose, and Don Towsley. Facilitating access point selection in IEEE 82. wireless networks. In Proc. of ACM IMC, 25. [38] George Athanasiou, Thanasis Korakis, Özgür Erçetin, and Leandros Tassiulas. Dynamic cross-layer association in 82.-based mesh networks. In Proc. of IEEE INFOCOM, 27. [39] Yigal Bejerano, Seung-Jae Han, and Li Erran Li. Fairness and load balancing in wireless LANs using association control. In Proc. of ACM MobiCom, 24. [4] Rohan Murty, Jitendra Padhye, Ranveer Chandra, Alec Wolman, and Brian Zill. Designing high performance enterprise Wi-Fi networks. In Proc. of USENIX NSDI, 28. [4] Boris Ginzburg and Alex Kesselman. Performance analysis of A-MPDU and A-MSDU aggregation in IEEE 82.n. In Proc. of IEEE Sarnoff Symposium, 27. [42] Xin He, Frank Y Li, and Jiaru Lin. Link adaptation with combined optimal frame size and rate selection in error-prone 82.n networks. In Proc. of IEEE ISWCS, 28. [43] Feng Kai-Ten, Lin Po-Tai, and Liu Wen-Jiunn. Frame-aggregated link adaptation protocol for next generation wireless local area networks. EURASIP Journal on Wireless Communications and Networking, 2:: :3, 2. [44] Xiufeng Xie, Xinyu Zhang, and Karthikeyan Sundaresan. Adaptive feedback compression for MIMO networks. In Proc. of ACM MobiCom, 23. [45] Hariharan Shankar Rahul, Swarun Kumar, and Dina Katabi. JMB: scaling wireless capacity with user demands. In Proc. of the ACM SIGCOMM, 22. [46] Horia Vlad Balan, Ryan Rogalin, Antonios Michaloliakos, Konstantinos Psounis, and Giuseppe Caire. Achieving high data rates in a distributed MIMO system. In Proc. of ACM MobiCom, 22 [47] Ning Ding, Daniel Wagner, Xiaomeng Chen, Y. Charlie Hu, and Andrew Rice. Characterizing and modeling the impact of wireless signal strength on smartphone battery drain. In Proc. of ACM SIGMETRICS, 23. [48] Sangeetha Bangolae, Carol Bell, and Emily Qi. Performance study of fast BSS transition using IEEE 82.r. In Proc. of ACM MobiCom, 26. [49] Deploying iphone and ipad Wi-Fi. In ios_6_wifi_sep2.pdf. [5] Jie Xiong and Kyle Jamieson. Arraytrack: a fine-grained indoor location system. In Proc. of USENIX NSDI,

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Qualcomm Atheros, Inc. 802.11ac MU-MIMO: Bridging the MIMO Gap in Wi-Fi

Qualcomm Atheros, Inc. 802.11ac MU-MIMO: Bridging the MIMO Gap in Wi-Fi Qualcomm Atheros, Inc. 802.11ac MU-MIMO: Bridging the MIMO Gap in Wi-Fi January, 2015 Qualcomm Atheros, Inc. Not to be used, copied, reproduced, or modified in whole or in part, nor its contents revealed

More information

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

IEEE802.11ac: The Next Evolution of Wi-Fi TM Standards

IEEE802.11ac: The Next Evolution of Wi-Fi TM Standards QUALCOMM, Incorporated May 2012 QUALCOMM is a registered trademark of QUALCOMM Incorporated in the United States and may be registered in other Countries. Other product and brand names may be trademarks

More information

Improving Wireless Network Performance Using Sensor Hints

Improving Wireless Network Performance Using Sensor Hints Improving Wireless Network Performance Using Sensor Hints Lenin Ravindranath, Calvin Newport, Hari Balakrishnan and Samuel Madden MIT Computer Science and Artificial Intelligence Laboratory {lenin, cnewport,

More information

Planning for 802.11ac Adoption with Ekahau Site Survey 6.0

Planning for 802.11ac Adoption with Ekahau Site Survey 6.0 Planning for 802.11ac Adoption with Ekahau Site Survey 6.0 1 P a g e w w w. e k a h a u. c o m / e s s Introduction to 802.11ac The emerging next generation Wi-Fi standard IEEE 802.11ac aims to break the

More information

Intelligent Channel Bonding in 802.11n WLANs

Intelligent Channel Bonding in 802.11n WLANs Intelligent Channel Bonding in 82.n WLANs Lara Deek, Eduard Garcia-Villegas, Elizabeth Belding, Sung-Ju Lee, Kevin Almeroth UC Santa Barbara, UPC-BarcelonaTECH, Narus Inc. laradeek@cs.ucsb.edu, eduardg@entel.upc.edu,

More information

Optimizing Wireless Networks.

Optimizing Wireless Networks. from the makers of inssider Optimizing Wireless Networks. Over the past few years, MetaGeek has created tools to help users optimize their wireless networks. MetaGeek s tools help visualize the physical

More information

Maximizing Throughput and Coverage for Wi Fi and Cellular

Maximizing Throughput and Coverage for Wi Fi and Cellular Maximizing Throughput and Coverage for Wi Fi and Cellular A White Paper Prepared by Sebastian Rowson, Ph.D. Chief Scientist, Ethertronics, Inc. www.ethertronics.com March 2012 Introduction Ask consumers

More information

Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks

Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks Multichannel Virtual Access Points for Seamless Handoffs in IEEE 8. Wireless Networks Maria Eugenia Berezin, Franck Rousseau, Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory

More information

IEEE 802.11n Enterprise Class Wireless LAN?

IEEE 802.11n Enterprise Class Wireless LAN? Introduction Over the last decade Wi-Fi has advanced from a technology offering a maximum 2Mbps over-theair data rate, to 11Mbps and now to 54Mbps. The technology has been improved to include additions

More information

ALLION USA INTERNET SERVICE PROVIDER WIRELESS GATEWAY COMPETITIVE ANALYSIS

ALLION USA INTERNET SERVICE PROVIDER WIRELESS GATEWAY COMPETITIVE ANALYSIS ALLION USA INTERNET SERVICE PROVIDER WIRELESS GATEWAY COMPETITIVE ANALYSIS Date: 4/25/2013 Rev 1.0 Visit our Web Site at: www.allionusa.com 1 Introduction Internet Service Providers (ISP) have a number

More information

Characterizing Wireless Network Performance

Characterizing Wireless Network Performance Characterizing Wireless Network Performance Ruckus Wireless Black Paper Accurate performance testing for wireless networks requires understanding how to test for worst case scenarios As expensive and inconvenient

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

CWNA Instructor Led Course Outline

CWNA Instructor Led Course Outline CWNA Instructor Led Course Outline Enterprise Wi-Fi Administration, Outline v7.0 Introduction The Enterprise Wireless LAN Administration 7.1 course (which prepares students for the CWNA-106 exam), whether

More information

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi (faa6@sfu.ca) Ehsan Arman (eaa14@sfu.ca) http://www.sfu.ca/~faa6

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

Solving the Sticky Client Problem in Wireless LANs SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS. Aruba Networks AP-135 and Cisco AP3602i

Solving the Sticky Client Problem in Wireless LANs SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS. Aruba Networks AP-135 and Cisco AP3602i SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS Aruba Networks AP-135 and Cisco AP3602i Conducted at the Aruba Proof-of-Concept Lab May 2013 Statement of test result confidence Aruba makes every attempt

More information

Realizing the Full Potential of PSM using Proxying

Realizing the Full Potential of PSM using Proxying Realizing the Full Potential of PSM using Proxying Ning Ding, Abhinav Pathak, Dimitrios Koutsonikolas 2, Clay Shepard 3, Y. Charlie Hu, Lin Zhong 3 Purdue University, 2 University at Buffalo, SUNY, 3 Rice

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

ENSC 427- Communication Networks Spring 2015. Quality of service of the wireless networking standard over a Multi user environment.

ENSC 427- Communication Networks Spring 2015. Quality of service of the wireless networking standard over a Multi user environment. ENSC 427- Communication Networks Spring 2015 Quality of service of the wireless networking standard over a Multi user environment Group 9 Name: Saumya Sangal Email: ssangal@sfu.ca Name: Jasmine Liu Email:

More information

High-Density Wi-Fi. Application Note

High-Density Wi-Fi. Application Note High-Density Wi-Fi Application Note Table of Contents Background... 3 Description... 3 Theory of Operation... 3 Application Examples... Tips and Recommendations... 7 2 Background One of the biggest challenges

More information

Optimizing Network and Client Performance Through Dynamic Airtime Scheduling. white paper

Optimizing Network and Client Performance Through Dynamic Airtime Scheduling. white paper Optimizing Network and Client Performance Through Dynamic Airtime Scheduling white paper Table of Contents Introduction... 3 Mixed Data Rates in Traditional Wireless LANs... 3 Aerohive QoS... 7 Dynamic

More information

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, aymanw@ppu.edu Duaa sweity

More information

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

Scanning Delays in 802.11 Networks

Scanning Delays in 802.11 Networks Scanning Delays in 802.11 Networks David Murray Murdoch University D.Murray@murdoch.edu.au Michael Dixon Murdoch University M.Dixon@murdoch.edu.au Terry Koziniec Murdoch University T.Koziniec@murdoch.edu.au

More information

A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks

A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks Gurpal Singh *, Ajay Pal Singh Atwal ** and B.S. Sohi *** * Deptt of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India,

More information

Delivering broadband internet access for high speed trains passengers using the new WiFi. standard 802.11n for train-to-ground communications

Delivering broadband internet access for high speed trains passengers using the new WiFi. standard 802.11n for train-to-ground communications Delivering broadband internet access for high speed trains passengers using the new WiFi standard 802.11n for train-to-ground communications Hassan GHANNOUM 1, David SANZ 1, Bernadette VILLEFORCEIX 2,

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

Testing a Wireless LAN

Testing a Wireless LAN Chapter 17 Testing a Wireless LAN This chapter will introduce you to: Wireless LAN Testing Considerations Signal Coverage Testing Performance Testing In-Motion Testing Security Vulnerability Testing Acceptance/Verification

More information

ZyXEL Smart Antenna - The solution to Wi-Fi challenges

ZyXEL Smart Antenna - The solution to Wi-Fi challenges ZyXEL Smart Antenna - The solution to Wi-Fi challenges White Paper Edition 1, Apr/2015 2 0 1 5 Z y X E L C o m m u n i c a t i o n s C o r p o r a t i o n, A l l R i g h t s R e s e r v e d. Executive

More information

Guide for wireless environments

Guide for wireless environments Sanako Study Guide for wireless environments 1 Contents Sanako Study... 1 Guide for wireless environments... 1 What will you find in this guide?... 3 General... 3 Disclaimer... 3 Requirements in brief...

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

Demystifying Wi-Fi Roaming

Demystifying Wi-Fi Roaming EDUCATIONAL BRIEF Demystifying Wi-Fi Roaming What You Need to Know to Avoid Costly Mistakes A wide variety of modern conveniences are made possible through Wi-Fi Networking. Home automation, real-time

More information

Best Practices for High Density Wireless Network Design In Education and Small/Medium Businesses

Best Practices for High Density Wireless Network Design In Education and Small/Medium Businesses Best Practices for High Density Wireless Network Design In Education and Small/Medium Businesses White Paper Table of Contents Executive Summary 3 Introduction 3 Determining Access Point Throughput 4 Establishing

More information

Mobility Management Advanced

Mobility Management Advanced Mobility Management Advanced Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Mobility Management Approaches in the TCP/IP Reference Model

More information

Top Six Considerations

Top Six Considerations Top Six Considerations for Upgrading to table of contents + Section I: Introduction Understanding...2 + Section II: Uses Cases for... 3 + Section III: Top 6 considerations for...5 + Section IV: Conclusion...

More information

Reducing MAC Layer Handoff Latency in IEEE 802.11 Wireless LANs

Reducing MAC Layer Handoff Latency in IEEE 802.11 Wireless LANs Reducing MAC Layer Handoff Latency in IEEE 80211 Wireless LANs Sangho Shin Andrea G Forte Columbia University {ss2020,andreaf}@cscolumbiaedu Anshuman Singh Rawat New York University asr245@nyuedu Henning

More information

Copyright 2014 Luxul. All rights reserved. All trademarks and registered trademarks are property of respective holders.

Copyright 2014 Luxul. All rights reserved. All trademarks and registered trademarks are property of respective holders. Copyright 2014 Luxul. All rights reserved. All trademarks and registered trademarks are property of respective holders. Things you need to know about Wi-Fi Roaming to avoid Costly Mistakes Martin Boulter,

More information

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks andres.arjona@nsn.com Hannu Verkasalo Helsinki University of Technology hannu.verkasalo@tkk.fi

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Cooperative Handoff in Wireless Networks

Cooperative Handoff in Wireless Networks Cooperative Handoff in Wireless Networks George Athanasiou, Thanasis Korakis and Leandros Tassiulas Dept. of Computer and Communications Engineering, University of Thessaly, Greece Email: gathanas@uth.gr

More information

Performance Measurement of Wireless LAN Using Open Source

Performance Measurement of Wireless LAN Using Open Source Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance

More information

Best Practices for Deploying Wireless LANs

Best Practices for Deploying Wireless LANs Best Practices for Deploying Wireless LANs An overview of special considerations in WLAN implementations As wireless LANs (WLANs) continue to grow in popularity, particularly in enterprise networks, the

More information

PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs

PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs Xiaodong Zhang Ohio State University in Collaborations with Enhua Tan, Ohio State Lei Guo, Yahoo! Songqing Chen, George

More information

Whitepaper. 802.11n The Next Generation in Wireless Technology

Whitepaper. 802.11n The Next Generation in Wireless Technology Whitepaper 802.11n The Next Generation in Wireless Technology Introduction Wireless technology continues to evolve and add value with its inherent characteristics. First came 802.11, then a & b, followed

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols.

Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols. 1 LCA Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols. Christina Vlachou, Julien Herzen, Patrick Thiran (EPFL) Marc Sommer, Hervé Dedieu (HEIG-VD) Gérôme Bovet, Jean

More information

Motion Sensing without Sensors: Information. Harvesting from Signal Strength Measurements

Motion Sensing without Sensors: Information. Harvesting from Signal Strength Measurements Motion Sensing without Sensors: Information Harvesting from Signal Strength Measurements D. Puccinelli and M. Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana,

More information

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

SAIL: Single Access Point-Based Indoor Localization

SAIL: Single Access Point-Based Indoor Localization SAIL: Single Access Point-Based Indoor Localization Alex Mariakakis University of Washington Jeongkeun Lee HP Labs Souvik Sen HP Labs Kyu-Han Kim HP Labs ABSTRACT This paper presents SAIL, a Single Access

More information

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student

More information

Wi-Fi Capacity Analysis for 802.11ac and 802.11n: Theory & Practice

Wi-Fi Capacity Analysis for 802.11ac and 802.11n: Theory & Practice Wi-Fi Capacity Analysis for 802.11ac and 802.11n: Theory & Practice By Timo Vanhatupa, Ph.D. Senior Research Scientist at Ekahau Contents Introduction Why capacity matters with Wi-Fi... 3 Part 1: Modeling

More information

Deploy WiFi Quickly and Easily

Deploy WiFi Quickly and Easily Deploy WiFi Quickly and Easily Table of Contents 3 Introduction 3 The Backhaul Challenge 4 Effortless WiFi Access 4 Rate Limiting 5 Traffic Filtering 5 Channel Selection 5 Enhanced Roaming 6 Connecting

More information

Handover Management based on the Number of Retries for VoIP on WLANs

Handover Management based on the Number of Retries for VoIP on WLANs Handover Management based on the Number of Retries for VoIP on WLANs Shigeru Kashihara Yuji Oie Department of Computer Science and Electronics, Kyushu Institute of Technology Kawazu 68-4, Iizuka, 82-852

More information

ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK

ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK The Rogue Access Point Problem One of the most challenging security concerns for IT managers today is the

More information

The Ultimate Solution For Metro and Rural Wi-Fi. Wavion White Paper April 2008

The Ultimate Solution For Metro and Rural Wi-Fi. Wavion White Paper April 2008 For Metro and Rural Wi-Fi Executive summary The current generation of conventional Wi-Fi metro access points use commoditized chipsets originally designed specifically for indoor environments. When brought

More information

Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet

Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers The Relay2 Smart Access Point (RA100) is an enterprise-class access point designed for deployment in high-density environments

More information

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products

More information

New Insights into WiFi-based Device-free Localization

New Insights into WiFi-based Device-free Localization New Insights into WiFi-based Device-free Localization Heba Aly Dept. of Computer and Systems Engineering Alexandria University, Egypt heba.aly@alexu.edu.eg Moustafa Youssef Wireless Research Center Egypt-Japan

More information

MEASURING WIRELESS NETWORK CONNECTION QUALITY

MEASURING WIRELESS NETWORK CONNECTION QUALITY Technical Disclosure Commons Defensive Publications Series January 27, 2016 MEASURING WIRELESS NETWORK CONNECTION QUALITY Mike Mu Avery Pennarun Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

WHITE PAPER. Realistic LTE Performance From Peak Rate to Subscriber Experience

WHITE PAPER. Realistic LTE Performance From Peak Rate to Subscriber Experience WHITE PAPER Realistic LTE Performance From Peak Rate to Subscriber Experience Realistic LTE Performance From Peak Rate to Subscriber Experience Introduction Peak data rates are often perceived as actual

More information

Extra-Sensory Perception for Wireless Networks

Extra-Sensory Perception for Wireless Networks Extra-Sensory Perception for Wireless Networks Lenin Ravindranath, Calvin Newport, Hari Balakrishnan, and Samuel Madden MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, MA, USA {lenin,cnewport,hari,madden}@csail.mit.edu

More information

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed Dmitrii Dugaev, Eduard Siemens Anhalt University of Applied Sciences - Faculty of Electrical,

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

GTER 26 tudo o que você. quer saber sobre 802.11n

GTER 26 tudo o que você. quer saber sobre 802.11n GTER 26 tudo o que você (não) quer saber sobre 802.11n Luiz Eduardo Dos Santos CISSP CWNE CEH GISP GCIH Sr. Systems & Security Engineer Americas hello agenda evolution of wi-fi what makes 11n what actually

More information

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.

More information

WI-FI PERFORMANCE BENCHMARK TESTING: Aruba Networks AP-225 and Cisco Aironet 3702i

WI-FI PERFORMANCE BENCHMARK TESTING: Aruba Networks AP-225 and Cisco Aironet 3702i WI-FI PERFORMANCE BENCHMARK TESTING: Networks AP-225 and Cisco Aironet 3702i Conducted at the Proof-of-Concept Lab January 24, 2014 Statement of Test Result Confidence makes every attempt to optimize all

More information

A survey on Spectrum Management in Cognitive Radio Networks

A survey on Spectrum Management in Cognitive Radio Networks A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,

More information

NXC5500/2500. Application Note. Smart Classroom Load Balancing. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation

NXC5500/2500. Application Note. Smart Classroom Load Balancing. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note Smart Classroom Load Balancing Copyright 2015 ZyXEL Communications Corporation Smart Classroom Load Balancing For wireless access service,

More information

LTE-Advanced Carrier Aggregation Optimization

LTE-Advanced Carrier Aggregation Optimization Nokia Networks LTE-Advanced Carrier Aggregation Optimization Nokia Networks white paper LTE-Advanced Carrier Aggregation Optimization Contents Introduction 3 Carrier Aggregation in live networks 4 Multi-band

More information

VOICE OVER WI-FI CAPACITY PLANNING

VOICE OVER WI-FI CAPACITY PLANNING VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited

More information

Protection Ripple in ERP 802.11 WLANs White Paper

Protection Ripple in ERP 802.11 WLANs White Paper Protection Ripple in ERP 802.11 WLANs White Paper June 2004 Planet3 Wireless, Inc. Devin Akin, CTO Devin@cwnp.com Copyright 2004 The CWNP Program www.cwnp.com Page 1 Understanding Use of 802.11g Protection

More information

WLAN 802.11ac Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue V1.0. Date 2014-04-23

WLAN 802.11ac Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue V1.0. Date 2014-04-23 WLAN 802.11ac Technology White Paper Issue V1.0 Date 2014-04-23 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Wireless LAN Services for Hot-Spot

Wireless LAN Services for Hot-Spot Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute wychoi53@etri.re.kr ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol

More information

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas

More information

Radio Resource Management in HiveOS. solution brief

Radio Resource Management in HiveOS. solution brief Radio Resource Management in HiveOS solution brief Radio Resource Management in HiveOS Introduction As enterprise wireless LANs have grown from a curiosity providing access in conference rooms into the

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

A TCP-like Adaptive Contention Window Scheme for WLAN

A TCP-like Adaptive Contention Window Scheme for WLAN A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Admission Control for VoIP Traffic in IEEE 802.11 Networks

Admission Control for VoIP Traffic in IEEE 802.11 Networks Admission Control for VoIP Traffic in IEEE 802.11 Networks Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: sgarg@avaya.com Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: mkappes@avaya.com

More information

Propsim enabled Mobile Ad-hoc Network Testing

Propsim enabled Mobile Ad-hoc Network Testing www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

HUAWEI Enterprise AP Series 802.11ac Brochure

HUAWEI Enterprise AP Series 802.11ac Brochure Enterprise AP Series 802.11ac Brochure 01 Enterprise AP Series 802.11ac Brochure 1 Overview Release of 802.11ac standards has driven wireless technologies to the era of GE Wi-Fi. Enterprise Wi-Fi networks

More information

Wi-Fi / WLAN Performance Management and Optimization

Wi-Fi / WLAN Performance Management and Optimization Wi-Fi / WLAN Performance Management and Optimization Veli-Pekka Ketonen CTO, 7signal Solutions Topics 1. The Wi-Fi Performance Challenge 2. Factors Impacting Performance 3. The Wi-Fi Performance Cycle

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

Algorithms for Interference Sensing in Optical CDMA Networks

Algorithms for Interference Sensing in Optical CDMA Networks Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern

More information

Your AP Knows How You Move: Fine-grained Device Motion Recognition through WiFi

Your AP Knows How You Move: Fine-grained Device Motion Recognition through WiFi Your AP Knows How You Move: Fine-grained Device Motion Recognition through WiFi Yunze Zeng, Parth H. Pathak, Chao Xu, Prasant Mohapatra Computer Science Department, University of California, Davis, CA,

More information

The Advantages and Disadvantages of Wireless Network Measurement

The Advantages and Disadvantages of Wireless Network Measurement An Overview of Link-Level Measurement Techniques for Wide-Area Wireless Networks Scott Raynel WAND Network Research Group Department of Computer Science University of Waikato smr26@cs.waikato.ac.nz Murray

More information